Behavioral task
behavioral1
Sample
93a89862b4cbe725c0a0e087492b4864f39945152777385ac49ab5c2ceedbf7e.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
93a89862b4cbe725c0a0e087492b4864f39945152777385ac49ab5c2ceedbf7e.xls
Resource
win10v2004-20240802-en
General
-
Target
93a89862b4cbe725c0a0e087492b4864f39945152777385ac49ab5c2ceedbf7e
-
Size
6.7MB
-
MD5
f8f0078793142d02a9e50f27bc9f28c9
-
SHA1
34a09aaa068f7da17adb3ba141237f6fabcf778e
-
SHA256
93a89862b4cbe725c0a0e087492b4864f39945152777385ac49ab5c2ceedbf7e
-
SHA512
ae29e38932a2f07595cfb5b260d89a8adffc101dbb5a31d5a21bf6ed04b3243f4a982282445a2206da2be5d993a7a73e33e54acc23df294046870323bede7880
-
SSDEEP
196608:lWVIl19U2A9rbznivOqjqtQsATTeTK7fq8RvENH:YVIlAnnnivOqaQsO6TKdsN
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
93a89862b4cbe725c0a0e087492b4864f39945152777385ac49ab5c2ceedbf7e.xls windows office2003
Kangatang
ThisWorkbook